Secure Radio Frequency DCS Watermark-Aided Physical Layer Authentication Design for NB-IoT Systems
Narrow band Internet of Things (NB-IoT) systems suffer from malicious attacks due to the broadcasting properties of wireless channels. Active attackers would falsify the transmitted data or the controlling signaling to interfere with the information trans
- PDF / 836,137 Bytes
- 17 Pages / 439.37 x 666.142 pts Page_size
- 58 Downloads / 148 Views
and Lin Zhang1,2(B)
1
2
School of Electronics and Information Technology, Sun Yat-sen University, Guangzhou 510006, China [email protected] Shandong Provincial Key Laboratory of Wireless Communication Technologies, Jinan, China Abstract. Narrow band Internet of Things (NB-IoT) systems suffer from malicious attacks due to the broadcasting properties of wireless channels. Active attackers would falsify the transmitted data or the controlling signaling to interfere with the information transmissions for legitimate users. In order to combat the active attacks, in this paper, we propose to apply the differential constellation shifting (DCS) radio frequency (RF) watermark to enhance the security of authentications. In our design, the DCS-aided RF watermarking is utilized to hide the authentication tags, and we construct the differential watermarked symbol pairs which consist of host and watermark symbols with a specific watermarking strength. At the receiver, by calculating the difference and the summation of the watermarked symbol pairs, both host and watermark symbols can be securely and reliably recovered. Simulation results demonstrate that our proposed schemes can effectively improve the bit error rate (BER) performances while the security performances outperform the benchmark watermark systems. Keywords: Differential constellation shifting (DCS) · Narrow band Internet of Things (NB-IoT) · Radio frequency (RF) watermark · Security and reliability
1
Introduction
Internet of Things (IoT) is the extension of the traditional Internet that aims at connecting every object to the Internet and construct massive machine-tomachine communication network [11]. Since the diversity and fragmentization of This work is partially supported by Guangdong Basic and Applied Basic Research Foundation (No. 2020A1515010703), the open research fund from Shandong Provincial Key Lab. of Wireless Communication Technologies (No. SDKLWCT-2019-05), Key Research and Development and Transformation Plan of Science and Technology Program for Tibet Autonomous Region (No. XZ201901-GB-16) and National Science Foundation of China (No. 61602531). c Springer Nature Singapore Pte Ltd. 2020 S. Yu et al. (Eds.): SPDE 2020, CCIS 1268, pp. 33–49, 2020. https://doi.org/10.1007/978-981-15-9129-7_3
34
H. Huang and L. Zhang
application scenarios severely limit the popularization of IoT system, the third Generation Partnership Project (3GPP) specified the standard of narrow band Internet of Things (NB-IoT) as a novel low power wide area (LPWA) technology in 2016 [1], which utilizes authorized frequency bands and cellular technology to access user ends so that the NB-IoT terminals could be easily integrated with the 5th Generation (5G) network. Benefit from the narrow band techniques and simplified architecture, NB-IoT system has advantages of low-cost, widespread, large-scale connections and low-power dissipations, while guaranteeing the robust transmission [18]. However, due to the broadcasting properties of wireless channels, the NB-IoT systems are vulnerab
Data Loading...